CN107977584A - The safe copy system of desktop type - Google Patents

The safe copy system of desktop type Download PDF

Info

Publication number
CN107977584A
CN107977584A CN201711342760.0A CN201711342760A CN107977584A CN 107977584 A CN107977584 A CN 107977584A CN 201711342760 A CN201711342760 A CN 201711342760A CN 107977584 A CN107977584 A CN 107977584A
Authority
CN
China
Prior art keywords
safe
desktop type
duplicating
task
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711342760.0A
Other languages
Chinese (zh)
Inventor
李春来
贾宇
唐立国
李继勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Railway Xinan Beijing Information Security Technology Co Ltd
Original Assignee
China Railway Xinan Beijing Information Security Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Railway Xinan Beijing Information Security Technology Co Ltd filed Critical China Railway Xinan Beijing Information Security Technology Co Ltd
Priority to CN201711342760.0A priority Critical patent/CN107977584A/en
Publication of CN107977584A publication Critical patent/CN107977584A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G03PHOTOGRAPHY; CINEMATOGRAPHY; ANALOGOUS TECHNIQUES USING WAVES OTHER THAN OPTICAL WAVES; ELECTROGRAPHY; HOLOGRAPHY
    • G03GELECTROGRAPHY; ELECTROPHOTOGRAPHY; MAGNETOGRAPHY
    • G03G15/00Apparatus for electrographic processes using a charge pattern
    • G03G15/50Machine control of apparatus for electrographic processes using a charge pattern, e.g. regulating differents parts of the machine, multimode copiers, microprocessor control
    • G03G15/5075Remote control machines, e.g. by a host
    • G03G15/5091Remote control machines, e.g. by a host for user-identification or authorisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/84Protecting input, output or interconnection devices output devices, e.g. displays or monitors

Abstract

The invention discloses a kind of safe copy system of desktop type, it is related to Information Security field.The system comprises:Remote management center and the safe Photocopier device of desktop type;The safe Photocopier device of desktop type is communicated to connect by wire communication facility and the remote management center;The remote management center includes management module, duplicates control module and communication module;The safe Photocopier device of desktop type, is responsible for performing the duplicating request of user, recording and copying process, and forms duplicating daily record and be uploaded to remote management center.The safe copy system of desktop type of the present invention to the unlimited property of copying process can manage by the authentication to duplicating person, duplicating time, duplicating number control function;It is controllable to the application solutions of copy by no storage hard disk, memory Protection Counter Functions;Subsequent trace is accomplished to audit by exporting trace and content auditing function so that copy is in highly safe environment during the entire process of duplicating.

Description

The safe copy system of desktop type
Technical field
The present invention relates to Information Security field, more particularly to a kind of safe copy system of desktop type.
Background technology
Numerous and diverse suitable for the duplicator brand of desktop on the market at present, species is very much.It is functionally and multifarious but all The multi-functional inner overwhelming majority comes into being for convenience of duplicating, and neither one is based on the function of duplicating safety.From the angle for duplicating safety Degree, existing duplicator have the following disadvantages:
1st, existing duplicator work is opening, duplicates number and does not control, is unfavorable for the duplicating of level of confidentiality paper document, easily Cause level of confidentiality paper document copy arbitrarily to spread, and be difficult to trace after the diffusion.
2nd, existing duplicator is made of human-computer interaction interface and scanning engine and print engine, and duplicator, which is generally in, to be treated Machine state, under the state, the text to be duplicated need to be only positioned over scanning engine interface by user, be set in human-computer interaction interface After duplicating number, scaling, concentration etc., startup starts, you can arbitrarily exports copy.Existing this processing mode increase copy Probability is spread, increase file content is divulged a secret risk, and there are the secret leaking wind of disaster level for the file with security requirements for this Danger.
The content of the invention
It is an object of the invention to provide a kind of safe copy system of desktop type, thus solve it is existing in the prior art before State problem.
To achieve these goals, the safe copy system of desktop type of the present invention, the system comprises:In remote management The heart and the safe Photocopier device of desktop type;The safe Photocopier device of desktop type passes through wire communication facility and the long-range pipe Manage center to center communications connection;
The remote management center includes management module, duplicates control module and communication module;
The management module, is responsible for the safe Photocopier device of desktop type, increasing that monitoring is connected with the remote management center Adduction deletes the user using the safe Photocopier device of desktop type, is also responsible for setting the authority of the user;, meanwhile, also The audit log filing and encryption storage that auditor is made;
The duplicating control module, is responsible for user's identity using the safe Photocopier device of desktop type, user's quilt Usage time, the duplicating number and current task that user is allowed to use device id, current task is allowed to is allowed to be permitted Perhaps the monitoring of number of pages;
The communication module, the duplicating daily record encrypted transmission be responsible for receiving and upload the safe Photocopier device of desktop type are given The management module, meanwhile, it also is responsible for setting the tactful encrypted transmission that management module issues to the safe duplicator of the desktop type It is standby;
The safe Photocopier device of desktop type, is responsible for performing the duplicating request of user, recording and copying process, and is formed Duplicate daily record and be uploaded to remote management center.
Preferably, management subsystem is duplicated in the safe Photocopier device installation of the desktop type, described to duplicate management subsystem Communicated to connect with the remote management center, the management subsystem that duplicates includes:
First acquisition module:The identity ID of user is obtained, and the identity ID is sent to remote management center certification;
Second acquisition module, receives and shows the authentication result that remote management center is sent;If the identity ID is recognized It is legal to demonstrate,prove, then show certification success, while show the identity ID remote management center pre-set and with the identity ID Matched duplicating task;If the identity ID is certified illegal, prompt identity ID illegal;The ginseng of the duplicating task Number includes:By the title of hard-copy file, code, level of confidentiality, number, number of pages and approver
Execution module is duplicated, is duplicated according to the duplicating tasks carrying, and in copying process, to the paper that will export Opening addition watermark information and Quick Response Code, the information that the Quick Response Code includes in real time is:User ID, duplicate time, desktop type Safe Photocopier device ID, duplicate number, number of copies, i.e., the number for the paper that will be exported, the paper that will export Number of pages, the title for duplicating content, user log in the safe copy system of the desktop type and initiate the task number of task;
Daily record generation module, performs in copying process, will duplicate content, the duplicating task is fabricated to and duplicates daily record upload To remote management center;
Understand module, when this duplicating is completed, remove automatically and all internal storage datas are produced in this copying process.
It is highly preferred that the safe Photocopier device of desktop type sets alarm, when the safe duplicator of the desktop type is set For when illegally being opened, the alarm is directly alarmed to the remote management center.
It is highly preferred that the safe Photocopier device of desktop type obtains the body of the user by the CPU card of user Part ID.
It is highly preferred that the safe Photocopier device of desktop type is the safe Photocopier device of desktop type of no hard disk.
It is highly preferred that the remote management center further includes:
Registration module, for receiving and preserving the log-on message of registrant;The registrant person of including the use of, auditor, Auditor and manager, the log-on message are the essential information of registrant, include the identity ID of registrant;
Login module, is used for realization the function that registrant logs in the remote management center;
Binding module, one or more bound for receiving and preserving Photocopier device ID safe with any one desktop type The identity ID of a user;
Task creation module, the ginseng for the duplicating task filled according to the user for signing in the remote management center Number, establishes duplicating task, and the duplicating task is sent to management module and is examined;The parameter bag of the duplicating task Include:By the title of hard-copy file, code, level of confidentiality, number, number of pages and approver;
Authentication challenge module, for after the identity ID that the safe Photocopier device of desktop type is sent is received, the long-range pipe Center certification identity ID legitimacies are managed, and determine to send the ID of the safe Photocopier device of desktop type of identity ID and the identity Whether ID binds, if unbound, prompts illegal;If binding, searches identity ID and pre-establishes and pass through examination & approval Duplicating task, and be sent to the safe Photocopier device of desktop type.
It is highly preferred that after the approver logs in the remote management center, the interior of the task to be copied that receives is checked Hold and duplicate the parameter of task, if the parameter matching of the content of task to be copied and duplicating task, examination & approval are qualified;If treat The content of duplicating task and the parameter mismatch for duplicating task, then examine unqualified.
Preferably, after the auditor logs in the remote management center, operation audit and content auditing are carried out:
Operation audit, on the basis of daily record is duplicated, to being uploaded to the user of remote management center to desktop type safety Photocopier device is audited using operation, and forms audit log;
Content auditing, is checked and the content duplicated that the safe Photocopier device of desktop type of auditing uploads, and makes audit Daily record, uploads after duplicating content and audit log encryption corresponding with duplicating content and is stored in remote management center.
Preferably, after the auditor logs in the remote management center, tactful examination & verification is carried out;
The strategy, which is audited, is:The received strategy of auditor's docking and parameter are audited, and are judged whether to meet and are set in advance The standard that fixed examination & verification passes through, if it is, examination & verification passes through, the strategy and parameter being reviewed come into force;If examination & verification is obstructed Cross, then the strategy of prompting examination & verification and parameter are illegal.
Preferably, the safe Photocopier device of the desktop type is specifically duplicated as steps described below:
S1, user log in the safe copy system of the desktop type and initiate task, fill in task parameters, the task ginseng Number includes:By the title of hard-copy file, code, level of confidentiality, number, number of pages and approver;The safe copy system of desktop type will The task is sent to god and is examined by people;
S2, after passing through with task examination & approval, user shows identity ID, desktop type to the safe Photocopier device of desktop type Safe Photocopier device to remote management center verify the identity ID whether legitimacy, if it is, into S3, if not, Then prompt the illegal prompting of user's identity;
S4, remote management center judge that the identity ID is there are usage time limitation and/or multiple safely using desktop type Machine equipment ID limitations are printed, if it is, inquiring about and judging whether current time is that user is allowed to use time and current table Whether type safe Photocopier device ID in face is that user is allowed to device id, if it is, into S5;If it is not, then prompting is not It can use and duplicate;
S5, remote principle center show that user appoints what step S1 was initiated in the safe Photocopier device of current desktop type Business, after the agreement of user, the safe Photocopier device of desktop type performs duplicating.
The beneficial effects of the invention are as follows:
The safe copy system of desktop type of the present invention, in the case where the original copy function of duplicator is constant, realization pair Duplicating personnel, the security control duplicated behavior, duplicate content and copier, ensure that copying process can manage, is controllable, can audit, The safety management to copy is lifted, effectively prevents the secret leaking behavior of copying process.
The safe copy system of desktop type of the present invention passes through the authentication to duplicating person, duplicating time, duplicating number Control function to the unlimited property of copying process can manage;By no storage hard disk, memory Protection Counter Functions to the safety of copy Realize controllable;Subsequent trace is accomplished to audit by exporting trace and content auditing function so that copy is in the whole of duplicating Highly safe environment is in during a.
Brief description of the drawings
Fig. 1 is the structure diagram of the safe copy system of desktop type;
Fig. 2 is the safe Photocopier device effect diagram of desktop type;
Fig. 3 is the copy example exported after duplicating;
Fig. 4 is the safe Photocopier device internal circuit composition structure diagram of desktop type.
Embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, below in conjunction with attached drawing, to the present invention into Row is further described.It should be appreciated that the specific embodiments described herein are not used to only to explain the present invention Limit the present invention.
Embodiment
With reference to Fig. 1, the safe copy system of the present embodiment desktop type includes:Remote management center and the safe duplicator of desktop type Equipment, the safe Photocopier device of desktop type are communicated to connect by wire communication facility and the remote management center;
More detailed description:
(1) on remote management center
Remote management center is managed using separation of the three powers principle, and the administrator of management module is responsible for safe duplicator The daily management and maintenance of equipment, the change that the auditor of auditing module is responsible for important management strategy are audited, mould of auditing The auditor of block is responsible for auditing to the operation behavior of all personnel and the duplicating behavior of safe duplicator.Remote management center Using B/S architecture designs.
The remote management center includes management module, duplicates control module and communication module;
The management module, is responsible for the safe Photocopier device of desktop type, increasing that monitoring is connected with the remote management center Adduction deletes the user using the safe Photocopier device of desktop type, is also responsible for setting the authority of the user;, meanwhile, also The audit log filing and encryption storage that auditor is made;
The duplicating control module, is responsible for user's identity using the safe Photocopier device of desktop type, user's quilt Usage time, the duplicating number and current task that user is allowed to use device id, current task is allowed to is allowed to be permitted Perhaps the monitoring of number of pages;
The communication module, the duplicating daily record encrypted transmission be responsible for receiving and upload the safe Photocopier device of desktop type are given The management module, meanwhile, it also is responsible for setting the tactful encrypted transmission that management module issues to the safe duplicator of the desktop type It is standby.
In the present embodiment, the remote management center further includes:
Registration module, for receiving and preserving the log-on message of registrant;The registrant person of including the use of, auditor, Auditor and manager, the log-on message are the essential information of registrant, include the identity ID of registrant;
Login module, is used for realization the function that registrant logs in the remote management center;
Binding module, one or more bound for receiving and preserving Photocopier device ID safe with any one desktop type The identity ID of a user;
Task creation module, the ginseng for the duplicating task filled according to the user for signing in the remote management center Number, establishes duplicating task, and the duplicating task is sent to management module and is examined;The parameter bag of the duplicating task Include:By the title of hard-copy file, code, level of confidentiality, number, number of pages and approver;
Authentication challenge module, for after the identity ID that the safe Photocopier device of desktop type is sent is received, the long-range pipe Center certification identity ID legitimacies are managed, and determine to send the ID of the safe Photocopier device of desktop type of identity ID and the identity Whether ID binds, if unbound, prompts illegal;If binding, searches identity ID and pre-establishes and pass through examination & approval Duplicating task, and be sent to the safe Photocopier device of desktop type.
Wherein, after the approver logs in the remote management center, check the task to be copied received content and The parameter of duplicating task, if the parameter matching of the content of task to be copied and duplicating task, examination & approval are qualified;It is if to be copied The content of task and the parameter mismatch for duplicating task, then examine unqualified.
Wherein, after the auditor logs in the remote management center, operation audit and content auditing are carried out:Operation is examined Meter, on the basis of daily record is duplicated, uses the safe Photocopier device of desktop type the user for being uploaded to remote management center Operation is audited, and forms audit log;Content auditing, is checked and duplicating that the safe Photocopier device of desktop type of auditing uploads The content crossed, and audit log is made, upload and store after content and audit log encryption corresponding with duplicating content will be duplicated In remote management center.
Wherein, after the auditor logs in the remote management center, tactful examination & verification is carried out;The strategy, which is audited, is:Examine The received strategy of core person's docking and parameter are audited, and judge whether to meet the standard set in advance audited and passed through, if so, Then examination & verification passes through, and the strategy and parameter being reviewed come into force;If examination & verification is not by prompting the tactful and parameter of examination & verification not It is legal.
Strategy and parameter include the use of people, usage time, watermark information and warning message, these information are set by administrator Fixed, administrator cannot come into force after setting, it is necessary to which auditor can just come into force after auditing approval.Administrator and auditor Difference:Administrator is responsible for carrying out regular maintenance to desktop type safe copy system, including equipment increases and decreases, user Member's increases and decreases.But these operations of administrator, will not come into force, it is necessary to which auditor's examination & verification can just give birth to after passing through Effect.
(2) the safe Photocopier device of desktop type
The safe Photocopier device of desktop type, the duplicating after module examination & verification passes through that is managed for being responsible for performing user are asked Ask, recording and copying process, and form duplicating daily record and be uploaded to remote management center.The safe Photocopier device of desktop type is the system The executing agency of system, is responsible for the duplicating demand to user and is accurately performed, and user's copying process is recorded, and is formed Log transmission is to remote management center, in case auditor's later audit.
In the present embodiment, management subsystem is duplicated in the safe Photocopier device installation of desktop type, described to duplicate management System is communicated to connect with the remote management center, and the management subsystem that duplicates includes:
First acquisition module:The identity ID of user is obtained, and the identity ID is sent to remote management center certification;
Second acquisition module, receives and shows the authentication result that remote management center is sent;If the identity ID is recognized It is legal to demonstrate,prove, then show certification success, while show the identity ID remote management center pre-set and with the identity ID Matched duplicating task;If the identity ID is certified illegal, prompt identity ID illegal;The ginseng of the duplicating task Number includes:By the title of hard-copy file, code, level of confidentiality, number, number of pages and approver
Execution module is duplicated, is duplicated according to the duplicating tasks carrying, and in copying process, to the paper that will export Opening addition watermark information and Quick Response Code, the information that the Quick Response Code includes in real time is:User ID, duplicate time, desktop type Safe Photocopier device ID, duplicate number, be number of copies, current number just in print paper, current just in print paper Number of pages, the title for duplicating content, user log in the safe copy system of the desktop type and initiate the task number of task;
Daily record generation module, performs in copying process, will duplicate content, the duplicating task is fabricated to and duplicates daily record upload To remote management center;
Understand module, when this duplicating is completed, remove automatically and all internal storage datas are produced in this copying process.
In the present embodiment, Quick Response Code is by according to the task information actually duplicated, (task information includes duplicating Fraction, number of copies, the fraction of current paper sheet, the number of pages of current paper sheet, task number, duplicating personal information, title) add in real time Add, and the paper of every copy has difference, also supports to add in the homepage of a copy or every page is all added.It is existing A Quick Response Code is previously generated when having technology essentially to receive duplicating task, all copy paper of the task are increased same Quick Response Code.
In the present embodiment, the safe Photocopier device of desktop type sets alarm, when the safe duplicator of the desktop type When equipment is illegally opened, the alarm is directly alarmed to the remote management center.
In the present embodiment, the safe Photocopier device of desktop type obtains the user's by the CPU card of user Identity ID.
In the present embodiment, the safe Photocopier device of desktop type is the safe Photocopier device of desktop type of no hard disk.
In the present embodiment, the safe Photocopier device of desktop type is specifically duplicated as steps described below:
S1, user log in the safe copy system of the desktop type and initiate task, fill in task parameters, the task ginseng Number includes:By the title of hard-copy file, code, level of confidentiality, number, number of pages and approver;The safe copy system of desktop type will The task is sent to god and is examined by people;
S2, after passing through with task examination & approval, user shows identity ID, desktop type to the safe Photocopier device of desktop type Safe Photocopier device to remote management center verify the identity ID whether legitimacy, if it is, into S3, if not, Then prompt the illegal prompting of user's identity;
S4, remote management center judge that the identity ID is there are usage time limitation and/or multiple safely using desktop type Machine equipment ID limitations are printed, if it is, inquiring about and judging whether current time is that user is allowed to use time and current table Whether type safe Photocopier device ID in face is that user is allowed to device id, if it is, into S5;If it is not, then prompting is not It can use and duplicate;
S5, remote principle center show that user appoints what step S1 was initiated in the safe Photocopier device of current desktop type Business, after the agreement of user, the safe Photocopier device of desktop type performs duplicating.
With reference to Fig. 2, in the present embodiment, Fig. 2 be the safe Photocopier device design sketch of desktop type, aobvious in the case of normal Standby Display screen is shown for a long time【It please swipe the card ...】Unauthorized user can not open duplicator at this time, and effectively card is swiped the card after, desktop type Safe Photocopier device can duplicate the relevant parameter information such as number according to the approval results automatic pre-set of remote management center, use Person need to only perform startup and duplicate.The copy exported after duplicating such as Fig. 3;Left on the copy of output preset Quick Response Code and watermark information, for tracking source and the importance of watchful user of service's this document.Duplicator is in output copy While can upload the relevant informations such as duplicating personnel, number, machine number automatically, with for subsequent log audit.
With reference to Fig. 4, the safe Photocopier device internal circuit composition structure of desktop type, the safe copier structure of desktop type includes Scanning engine, print engine, driving plate, master control borad, power panel, interface board and UI interactive interfaces.Scanning engine function is to pass through Paper document is converted into high-resolution e-file by accurate optics;Print engine is mainly responsible for paper document By on laser transfer to paper;Master control borad is mainly used for that user logic and each module operating flow are handled and controlled.Drive Movable plate is for being driven to correlation engine so that mechanical equipment is precisely run under software program.Interface board is mainly used In externally progress data interaction and power supply supply;UI interactive interfaces are mainly used for parameter input and shape between user and machine State is inquired about.
Desktop type strengthens safely mechanically and electrically submodule of the duplicator by high-precision, in the accurate of embedded software Safe copy function is realized under scheduling so that the copying process of paper document is able to maximum safeguard protection.
Function on herein described system is discussed in detail:
1. authentication:
Secure private duplicator is using the close CPU card of state as authentication unique channel.Duplicator, will after start completion Into interface is welcome, to unauthenticated or authentification failure user, which can not show copy machine operation related key, wait to pass through After CPU card certification, it can be configured to duplicating parameter, including:Number, scaling, gray scale etc..CPU card authentication, Ke Yiqi To the controllable management to duplicator.
2. memory is reset
Secure private duplicator is after each duplicating flow, it will the mediant to being produced in operational process automatically According to memory clearing is carried out, avoid because memory produces leakage of data.
3. without hard disk
Secure private Photocopier device without hard disk design, avoids the landing of data from storing in itself, reduces what is produced by hard disk Leakage of data.
4. export trace
Secure private duplicator can presetting according to administrative staff, to output paper document carry out force addition water Official seal ceases and two-dimensional bar code, the wherein word content of watermark information, size, transparency, gradient, position etc. can freely be set It is fixed;2 D code information includes duplicating personnel, duplicates time, duplicator numbering, duplicates number, copy numbering etc..
4. number controls
Secure private duplicator in use, can combine administrative center, to the current duplicating number for duplicating personnel Or number of copies carries out upper limit control, reduce user of service and arbitrarily use duplicator, avoid duplicating divulging a secret for generation because unrestricted. And it can also play a role to energy conservation and environmental protection.
6. time control
Secure private duplicator can carry out time restriction to duplicating personnel, avoid duplicating personnel in inoperative or unauthorized Special duplicator safe to use in time, plays the role of to duplicating management and control.
7. operation audit
Operation audit includes use operation of operation and duplicating personnel of the administrative staff to whole system to duplicator.Audit Member can be checked and be audited by logging in operation note of the Audit Module to the above persons.
8. content auditing
Auditor to the file content duplicated can check audit in system by logging in Audit Module, in file Appearance uploads to administrative center in an encrypted form, and by encrypting document form storage and management center, and the functions of modules Can be by client's sets itself whether enabling.
9. trace to its source
Auditor can carry out two dimension by the function of tracing to its source of logging in Audit Module to the paper document exported Code scanning, and can check the duplicating personnel of this document, duplicator numbering, duplicate number, current copy numbering and duplicate when Between etc. information.
Workflow on herein described system mainly presses following steps:
A1, task are initiated:Duplicating personnel fill in hard-copy file title, code, close as requested by logging in management system After the information such as level, number, number of pages, approver, which can be pushed to related personnel by system automatically.
A2, task examination & approval:After duplicating task is duplicated people's initiation, system will notify approver in the form of bubble, examination & approval People can check current task content, and voluntarily judge whether that examination & approval pass through
A3, task are got:After task examination & approval pass through, the database of administrative center can be voluntarily stored in a manner of encrypted, Task promoter need to hold effective ID card and swiping card is performed on specified duplicator, after duplicator verification identity success, Shen Please the current all duplicating tasks for duplicating personnel are transferred from administrative center's database.Duplicate personnel selection task and click on and get i.e. Can.
A4, perform task:Duplicator can duplicate parameter, bag after user gets task according to task definition, voluntarily adjustment Include and duplicate the relevant informations such as number, number of pages and perform duplicating working.While duplicating, duplicator can be according to strategy by duplicating Appearance and status log, pass back to administrative center in an encrypted form.
A5, log audit:Administrative center will store System Operation Log and user's usage log in an encrypted form, Auditor can be checked and audited to information above with login system.
By using above-mentioned technical proposal disclosed by the invention, following beneficial effect has been obtained:
The safe copy system of desktop type of the present invention, in the case where the original copy function of duplicator is constant, realization pair Duplicating personnel, the security control duplicated behavior, duplicate content and copier, ensure that copying process can manage, is controllable, can audit, The safety management to copy is lifted, effectively prevents the secret leaking behavior of copying process.
The safe copy system of desktop type of the present invention passes through the authentication to duplicating person, duplicating time, duplicating number Control function to the unlimited property of copying process can manage;By no storage hard disk, memory Protection Counter Functions to the safety of copy Realize controllable;Subsequent trace is accomplished to audit by exporting trace and content auditing function so that copy is in the whole of duplicating Highly safe environment is in during a.
The above is only the preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications also should Depending on protection scope of the present invention.

Claims (10)

  1. A kind of 1. safe copy system of desktop type, it is characterised in that the system comprises:Remote management center and desktop type safety Photocopier device;The safe Photocopier device of desktop type passes through wire communication facility and the remote management center communication link Connect;
    The remote management center includes management module, duplicates control module and communication module;
    The management module, be responsible for monitoring be connected with the remote management center the safe Photocopier device of desktop type, increase and The user using the safe Photocopier device of desktop type is deleted, is also responsible for setting the authority of the user;, meanwhile, it will also examine The audit log filing and encryption storage that meter person makes;
    The duplicating control module, is responsible for being allowed to user's identity using the safe Photocopier device of desktop type, user It is duplicating number and current task is allowed to that usage time, user are allowed to use device id, current task is allowed to The monitoring of number of pages;
    The communication module, the duplicating daily record encrypted transmission be responsible for receiving and upload the safe Photocopier device of desktop type is to described Management module, meanwhile, it also is responsible for the tactful encrypted transmission that management module issues to the safe Photocopier device of the desktop type;
    The safe Photocopier device of desktop type, is responsible for performing the duplicating request of user, recording and copying process, and forms duplicating Daily record is uploaded to remote management center.
  2. 2. the safe copy system of desktop type according to claim 1, it is characterised in that the safe Photocopier device of desktop type Management subsystem is duplicated in installation, and the management subsystem that duplicates is communicated to connect with the remote management center, described to duplicate management Subsystem includes:
    First acquisition module:The identity ID of user is obtained, and the identity ID is sent to remote management center certification;
    Second acquisition module, receives and shows the authentication result that remote management center is sent;If the identity ID is certified conjunction Method, then show certification success, while shows that the identity ID pre-sets in remote management center and matched with the identity ID Duplicating task;If the identity ID is certified illegal, prompt identity ID illegal;The parameter bag of the duplicating task Include:By the title of hard-copy file, code, level of confidentiality, number, number of pages and approver
    Execution module is duplicated, is duplicated according to the duplicating tasks carrying, and in copying process, to the paper reality that will export Shi Tianjia watermark informations and Quick Response Code, the information that the Quick Response Code includes are:User ID, duplicate time, desktop type safety Photocopier device ID, duplicate number, number of copies, the number for the paper that will export, the paper that will export number of pages, Duplicate the title of content, user logs in the safe copy system of the desktop type and initiates the task number of task;
    Daily record generation module, performs in copying process, will duplicate content, the duplicating task is fabricated to duplicating daily record and is uploaded to far Thread management center;
    Understand module, when this duplicating is completed, remove automatically and all internal storage datas are produced in this copying process.
  3. 3. the safe copy system of desktop type according to claim 2, it is characterised in that the safe Photocopier device of desktop type Alarm is set, and when the safe Photocopier device of the desktop type is illegally opened, the alarm is directly to the long-range pipe Alarm at reason center.
  4. 4. the safe copy system of desktop type according to claim 2, it is characterised in that the safe Photocopier device of desktop type The identity ID of the user is obtained by the CPU card of user.
  5. 5. the safe copy system of desktop type according to claim 1, it is characterised in that the safe Photocopier device of desktop type For the safe Photocopier device of desktop type of no hard disk.
  6. 6. the safe copy system of desktop type according to claim 1, it is characterised in that the remote management center further includes:
    Registration module, for receiving and preserving the log-on message of registrant;The registrant person of including the use of, auditor, audit Member and manager, the log-on message are the essential information of registrant, include the identity ID of registrant;
    Login module, is used for realization the function that registrant logs in the remote management center;
    Binding module, the one or more for receiving and preserving Photocopier device ID bindings safe with any one desktop type make The identity ID of user;
    Task creation module, the parameter for the duplicating task filled according to the user for signing in the remote management center, builds Vertical duplicating task, and the duplicating task is sent to management module and is examined;The parameter of the duplicating task includes:Answered Title, code, level of confidentiality, number, number of pages and the approver of printed text part;
    Authentication challenge module, for after the identity ID that the safe Photocopier device of desktop type is sent is received, in the remote management Heart certification identity ID legitimacies, and determine that the ID and identity ID that send the safe Photocopier device of desktop type of identity ID are No binding, if unbound, is prompted illegal;If binding, search identity ID and pre-establish and answering by examination & approval Print task, and it is sent to the safe Photocopier device of desktop type.
  7. 7. the safe copy system of desktop type according to claim 6, it is characterised in that the approver logs in the long-range pipe Behind reason center, check the task to be copied received content and duplicate task parameter, if the content of task to be copied and The parameter matching of duplicating task, then examination & approval are qualified;If the content of task to be copied and the parameter mismatch for duplicating task, are examined Criticize unqualified.
  8. 8. the safe copy system of desktop type according to claim 1, it is characterised in that the auditor logs in the long-range pipe Behind reason center, operation audit and content auditing are carried out:
    Operation audit, on the basis of daily record is duplicated, duplicates safely desktop type the user for being uploaded to remote management center Machine equipment is audited using operation, and forms audit log;
    Content auditing, is checked and the content duplicated that the safe Photocopier device of desktop type of auditing uploads, and makes audit log, Uploaded after content and audit log encryption corresponding with duplicating content will be duplicated and be stored in remote management center.
  9. 9. the safe copy system of desktop type according to claim 1, it is characterised in that the auditor logs in the long-range pipe Behind reason center, tactful examination & verification is carried out;
    The strategy, which is audited, is:The received strategy of auditor's docking and parameter are audited, and judge whether to meet set in advance The standard passed through is audited, if it is, examination & verification passes through, the strategy and parameter being reviewed come into force;If examination & verification not by, The strategy and parameter of prompting examination & verification are illegal.
  10. 10. the safe copy system of desktop type according to claim 1, it is characterised in that the safe duplicator of desktop type is set It is standby specifically to be duplicated as steps described below:
    S1, user log in the safe copy system of the desktop type and initiate task, fill in task parameters, the task parameters bag Include:By the title of hard-copy file, code, level of confidentiality, number, number of pages and approver;The safe copy system of desktop type is by described in Task is sent to god and is examined by people;
    S2, after passing through with task examination & approval, user shows identity ID, desktop type safety to the safe Photocopier device of desktop type Photocopier device to remote management center verify the identity ID whether legitimacy, if it is, into S3, if it is not, then carrying Show the illegal prompting of user's identity;
    S4, remote management center judge that the identity ID is there are usage time limitation and/or uses the safe duplicator of desktop type Device id limits, if it is, inquiring about and judging whether current time is that user is allowed to use time and current desktop type Whether safe Photocopier device ID is that user is allowed to device id, if it is, into S5;If it is not, then prompting cannot make With duplicating;
    S5, remote principle center show the task that user initiates in step S1 in the safe Photocopier device of current desktop type, After the agreement of user, the safe Photocopier device of desktop type performs duplicating.
CN201711342760.0A 2017-12-14 2017-12-14 The safe copy system of desktop type Pending CN107977584A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711342760.0A CN107977584A (en) 2017-12-14 2017-12-14 The safe copy system of desktop type

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711342760.0A CN107977584A (en) 2017-12-14 2017-12-14 The safe copy system of desktop type

Publications (1)

Publication Number Publication Date
CN107977584A true CN107977584A (en) 2018-05-01

Family

ID=62006568

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711342760.0A Pending CN107977584A (en) 2017-12-14 2017-12-14 The safe copy system of desktop type

Country Status (1)

Country Link
CN (1) CN107977584A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108762013A (en) * 2018-06-27 2018-11-06 阜阳市金天数码科技有限公司 A kind of duplicator
CN108803279A (en) * 2018-06-27 2018-11-13 阜阳市金天数码科技有限公司 A kind of duplicator
CN108803278A (en) * 2018-06-27 2018-11-13 阜阳市金天数码科技有限公司 A kind of duplicator
CN108828918A (en) * 2018-06-27 2018-11-16 阜阳市金天数码科技有限公司 A kind of duplicator
CN108845486A (en) * 2018-06-27 2018-11-20 阜阳市金天数码科技有限公司 A kind of duplicator
CN108845482A (en) * 2018-06-27 2018-11-20 阜阳市金天数码科技有限公司 A kind of duplicator
CN108873643A (en) * 2018-06-27 2018-11-23 阜阳市金天数码科技有限公司 A kind of duplicator
CN109753254A (en) * 2019-01-11 2019-05-14 中国人民解放军国防科技大学 Duplicator secrecy management and control system based on RFID
CN113341803A (en) * 2021-06-02 2021-09-03 北京鼎普科技股份有限公司 Safety copying control system and method

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101686294A (en) * 2009-08-10 2010-03-31 北京立思辰新技术有限公司 Embedded type file information security management system
CN201974640U (en) * 2010-12-15 2011-09-14 河北汉光重工有限责任公司 Security-enhanced copier
CN102541482A (en) * 2010-12-27 2012-07-04 北大方正集团有限公司 Method and system for document printing control and document tracing
CN102749874A (en) * 2012-06-14 2012-10-24 北京立思辰计算机技术有限公司 Duplicating monitoring system
CN102880101A (en) * 2012-08-30 2013-01-16 北京立思辰计算机技术有限公司 Full-loop-locked copying safety monitoring device and method
CN102880831A (en) * 2012-08-27 2013-01-16 北京立思辰计算机技术有限公司 Method for securely copying confidential paper
CN104598596A (en) * 2015-01-23 2015-05-06 王小安 Paperless file system
CN105187220A (en) * 2015-10-26 2015-12-23 南威软件股份有限公司 Centralized script material printing management system
CN106557285A (en) * 2015-09-25 2017-04-05 腾讯科技(深圳)有限公司 Method of printing and device
CN107066844A (en) * 2017-04-12 2017-08-18 李晓妮 A kind of method and apparatus of paper document security management and control and tracing

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101686294A (en) * 2009-08-10 2010-03-31 北京立思辰新技术有限公司 Embedded type file information security management system
CN201974640U (en) * 2010-12-15 2011-09-14 河北汉光重工有限责任公司 Security-enhanced copier
CN102541482A (en) * 2010-12-27 2012-07-04 北大方正集团有限公司 Method and system for document printing control and document tracing
CN102749874A (en) * 2012-06-14 2012-10-24 北京立思辰计算机技术有限公司 Duplicating monitoring system
CN102880831A (en) * 2012-08-27 2013-01-16 北京立思辰计算机技术有限公司 Method for securely copying confidential paper
CN102880101A (en) * 2012-08-30 2013-01-16 北京立思辰计算机技术有限公司 Full-loop-locked copying safety monitoring device and method
CN104598596A (en) * 2015-01-23 2015-05-06 王小安 Paperless file system
CN106557285A (en) * 2015-09-25 2017-04-05 腾讯科技(深圳)有限公司 Method of printing and device
CN105187220A (en) * 2015-10-26 2015-12-23 南威软件股份有限公司 Centralized script material printing management system
CN107066844A (en) * 2017-04-12 2017-08-18 李晓妮 A kind of method and apparatus of paper document security management and control and tracing

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108762013A (en) * 2018-06-27 2018-11-06 阜阳市金天数码科技有限公司 A kind of duplicator
CN108803279A (en) * 2018-06-27 2018-11-13 阜阳市金天数码科技有限公司 A kind of duplicator
CN108803278A (en) * 2018-06-27 2018-11-13 阜阳市金天数码科技有限公司 A kind of duplicator
CN108828918A (en) * 2018-06-27 2018-11-16 阜阳市金天数码科技有限公司 A kind of duplicator
CN108845486A (en) * 2018-06-27 2018-11-20 阜阳市金天数码科技有限公司 A kind of duplicator
CN108845482A (en) * 2018-06-27 2018-11-20 阜阳市金天数码科技有限公司 A kind of duplicator
CN108873643A (en) * 2018-06-27 2018-11-23 阜阳市金天数码科技有限公司 A kind of duplicator
CN109753254A (en) * 2019-01-11 2019-05-14 中国人民解放军国防科技大学 Duplicator secrecy management and control system based on RFID
CN113341803A (en) * 2021-06-02 2021-09-03 北京鼎普科技股份有限公司 Safety copying control system and method

Similar Documents

Publication Publication Date Title
CN107977584A (en) The safe copy system of desktop type
CN105049659B (en) Image processing system and information processing method
CN104717389B (en) Information processor and its control method
JP4323098B2 (en) A signature system that verifies the validity of user signature information
US20210191671A1 (en) Intelligent seal with cloud computing-based anti-forgery capability
CN101097416B (en) Printing system, printing control method
CN101686294B (en) Embedded type file information security management system
CN108174049A (en) Image forms auditing method, system and image formation system
CN108830502A (en) A kind of seal system
CN101377731A (en) Method and terminal for controlling document print
CN107977174A (en) Cloud print system and method based on wechat barcode scanning certification
CN110471632A (en) File printout, inspection method, device, electronic equipment and readable storage medium storing program for executing
KR20180066500A (en) Apparatus and Method for signing electronic contract using digital official seal
CN104202304A (en) Method for certificating the seal by third party, and seal certification system based on the method
CN108206803A (en) Business acts on behalf processing method and processing device
CN107205102A (en) Information processor and control method
CN110580406B (en) Internet file self-help importing system and method
CN102749874A (en) Duplicating monitoring system
CN109063503A (en) A kind of watermark embedding apparatus and method
JP5531521B2 (en) Document management system, document operation device, and program
CN109902458A (en) A kind of method and apparatus of document print control
TWM520159U (en) Device for generating and identifying electronic document containing electronic authentication and paper authentication
CN111984957A (en) Confidential document identification and tracking system based on fingerprint anti-counterfeiting
CN101616148B (en) Internet transaction identity authentication method and device
CA2522905A1 (en) Self-enrollment and authentication method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180501